It will scan for sus parameters and generate you a complete wordlist with one click of a button. See it in action 👇
It will scan for sus parameters and generate you a complete wordlist with one click of a button. See it in action 👇
Watch how it does: youtu.be/eQBD2-k9V7s
Watch how it does: youtu.be/eQBD2-k9V7s
github.com/CoreyD97/Ins...
github.com/CoreyD97/Ins...
gitlab.com/-/snippets/4...
gitlab.com/-/snippets/4...
For example, in order to run netcat with command-line editing, simply execute "rlwrap nc localhost 80". Easy, isn't it?
github.com/hanslub42/rl...
For example, in order to run netcat with command-line editing, simply execute "rlwrap nc localhost 80". Easy, isn't it?
github.com/hanslub42/rl...
✨ V I B E C O D I N G✨ a vulnerable proof-of-concept app. youtu.be/dL1a0KcAW3Y
✨ V I B E C O D I N G✨ a vulnerable proof-of-concept app. youtu.be/dL1a0KcAW3Y
www.youtube.com/watch?v=RV0L...
www.youtube.com/watch?v=RV0L...
portswigger.net/research/sha...
portswigger.net/research/sha...
1️⃣ Inconsistent handling of exceptional input
portswigger.net/web-security...
2️⃣ Providing an encryption oracle
portswigger.net/web-security...
1️⃣ Inconsistent handling of exceptional input
portswigger.net/web-security...
2️⃣ Providing an encryption oracle
portswigger.net/web-security...
I'm exhausted, but I saw enough smiles from folks that it made it all worth it.
See you all next time 😁
I'm exhausted, but I saw enough smiles from folks that it made it all worth it.
See you all next time 😁
portswigger.net/research/byp...
portswigger.net/research/byp...
Replace `Content-Type: application/json` with `Content-Type: application/xml` in requests and look for XML parsing errors in responses 🛠️
That will allow you to identify XML-processing endpoints 🧠
Replace `Content-Type: application/json` with `Content-Type: application/xml` in requests and look for XML parsing errors in responses 🛠️
That will allow you to identify XML-processing endpoints 🧠
portswigger.net/research/top...
portswigger.net/research/top...
That doesn't look like a game-changer, but it's incredibly useful when you want to avoid that these raw characters break Burp's HTTP parsing
That doesn't look like a game-changer, but it's incredibly useful when you want to avoid that these raw characters break Burp's HTTP parsing
Here’s today’s edition, "AppSec Ezine - 566th" 📚
Here’s today’s edition, "AppSec Ezine - 566th" 📚
It is based on a real-world situation. Use the HTML injection to leak the flag to an external domain ☃️
This time, send solutions in DM; we don't want to spoil the fun. I also might want to patch any obvious blunder I made creating it
joaxcar.com/xss/outer.ht...
It is based on a real-world situation. Use the HTML injection to leak the flag to an external domain ☃️
This time, send solutions in DM; we don't want to spoil the fun. I also might want to patch any obvious blunder I made creating it
joaxcar.com/xss/outer.ht...